General

  • Target

    cd2b64d529d69709bacacb55cdb7b1b98d556d0b3ba9ad4afdfeddc23580ec23

  • Size

    832KB

  • Sample

    241211-3bj54asjhx

  • MD5

    d0548c9d66cf92fabdc235eb1446b0e6

  • SHA1

    4694eb402e82efcf1edd6983742dd49528c335af

  • SHA256

    cd2b64d529d69709bacacb55cdb7b1b98d556d0b3ba9ad4afdfeddc23580ec23

  • SHA512

    9bc66d30cc25dad26645cf5abff567b07c8fcbeb876ab5011db38514d9fdb792f55d4fe7b46006107f18849b5f610ffeaa4a7834a862b4403c03fca9ad301cb5

  • SSDEEP

    12288:Ua32eNwbYlNYJjdpoHZ/SitMF/K7VwhSHFEFqlKGD+9zfbW2A8La47ytjdjY/x/l:P5NwONYho1i+7HFqJ+CzDgtjdM/cu

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

154.216.17.190:2404

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-3W6OXK

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      Payment_Advice.exe

    • Size

      1.3MB

    • MD5

      0f7b4b89b578e2971d00510d2c3a6e3f

    • SHA1

      5a0a0087bf64964b698809694f3b2b15183e6e48

    • SHA256

      38a21f4c7f449e87a7881041e2c0f1b6f8229d93349e2382b7e6326db1f3e417

    • SHA512

      db36fe84ca01fbdb7613a1fb6b11df91ed6cccb2fb042080e7bb98261c0a8e8b6fd95801e234ad418a516e6dfad0d920bc610d4b2b4a490dafde33a2a5e7d1c4

    • SSDEEP

      24576:Qu6J33O0c+JY5UZ+XC0kGso6FaMAp6BAo1Ibov1SKyjFyVxvWY:au0c++OCvkGs9FaMAgBjILKUgSY

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks